= IPMI = IPMI allows us to access a physical server removetly, as if we were in the colo with a monitor and keyboard plugged in. At least in theory. We used to use [wiki:telehouse_serial_access a simple serial cable] to achieve this feat. However, new servers are no longer beings shipped with serial ports and motherboard/bios software no longer support them. Instead, we are expected to use IPMI. IPMI provides a million ways to connect, but we are enabling two. Both are configured to use a local, non-routable IP address. * web-based access (we will setup nginx to proxy from a public address to the non-routable address) * serial over LAN access, using ipmiutil which will be run from a server in the cabinet Unfortunately, IPMI is complex and varies considerably from computer to computer. Here are the steps used to connect john. == BIOS/Setup == When you first boot the computer, IPMI has to be enabled and assigned an IP address. We use a non-routable IP address so the only way to connect to IPMI is via a machine in the colo itself. Below are the screen shots of the bios and their settings. [[Image(1.advanced-super-io.png​)]] [[Image(2.advanced-superio-SOL.png​)]] [[Image(3.advanced-serial-port-console-redirection.png​)]] [[Image(4.advanced-serial-console-redirection-first-page.png​ )]] [[Image(5.advanced-console-redirection-settings-first.png)]] [[Image(6.advanced-console-redirection-settings-second.png​)]] [[Image(7.ipmi-settings.png)]] == Setup IPMI == Now, you can access the IPMI web configuration. But... by default it will redirect http to https. That messes up the proxy via nginx thing so we have to turn that off. Set your computer which is in the cabinet and plugged into the swtich to use an IP address in the same network, e.g.: {{{ sudo ip addr add 192.168.56.99/24 dev enp1s0f2 }}} Then, point your browser to the IP address you assigned the IPMI server above and click through the self-signed certificate warnings. The default user pass is: ADMIN/ADMIN - case sensitive! Here are some important changes: * Configuration -> Users * Change password for ADMIN user. **NOTE** make password 16 characters or less and keep out weird characters. It is possible to lock yourself out with this step. * Configuration -> Port * Only check off Web port (80) and Ikvm server port (5900) Now, you can access the "monitor" by clicking Remove Control -> iKVM/HTML5 == Enable http redirections == On robideau, we have the following nginx configuration name .conf to allow lets encrypt to find and validate https certificates: {{{ server { listen 80; server_name ipmi.john.mayfirst.org; root /var/www/html; location /.well-known/acme-challenge { try_files $uri $uri/ =404; } location / { return 301 https://$host$request_uri; } } }}} In addition, we have this .ssl.conf file in site-enabled so it is no accessible (but keep the .conf file so letsencrypt can do it's job.